Skip to search formSkip to main contentSkip to account menu

Military computers

Known as: Military computer 
This article specifically addresses US armed forces military computers and their use.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This article positions the vogue for cybernetics as a key driver of the transformation of the institutional structures and… 
2014
2014
2. FDA Regulation of Mobile Medical Applications Following the proliferation of medical devices with software components and the… 
Review
2011
Review
2011
Several methods have been proposed to treat combat veterans with posttraumatic stress disorder (PTSD). Still, a recent review… 
2010
2010
This chapter contains sections titled: Silicon for Military Computing, Defining Fairchild's Manufacturing Technology, Recasting… 
Review
2008
Review
2008
  • S. Dewar
  • 42nd Annual IEEE International Carnahan…
  • 2008
  • Corpus ID: 9461745
This paper discusses the integration of perimeter intrusion detect systems (PIDS), the various elements of an overall PIDS field… 
Highly Cited
2003
Highly Cited
2003
  • I. Arce
  • IEEE Secur. Priv.
  • 2003
  • Corpus ID: 15409785
It is a common saying that a chain is only as strong as its weakest link-a phrase information security officers, IT managers… 
Highly Cited
1988
Highly Cited
1988
Extensions of program flow monitors and n-version programming can be combined to provide a solution to the detection and… 
Highly Cited
1985
Highly Cited
1985
  • J. McLean
  • Inf. Process. Lett.
  • 1985
  • Corpus ID: 14713905
1977
1977
Selecting or even designing a computer architecture is at best as much a black art as a science. The problem is particularly… 
1973
1973
Abstract : This document is a collection of working papers produced by the members of the Computer Security Branch, Directorate…